Results 1 to 10 of about 7,063 (159)

Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]

open access: yesViruses
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss   +3 more
doaj   +2 more sources

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +2 more sources

Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]

open access: yesSensors
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey   +4 more
doaj   +2 more sources

An Electro-optical Hybrid Encryption Method based on MD5 Verification

open access: yesGuangtongxin yanjiu, 2022
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran   +5 more
doaj   +3 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13

open access: yesBuana Information Technology and Computer Sciences, 2020
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj   +1 more source

Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China

open access: yesViruses, 2022
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng   +9 more
doaj   +1 more source

PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO

open access: yesJurnal Saintekom, 2020
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj   +1 more source

Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah

open access: yesTechno.Com, 2023
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba   +3 more
doaj   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

Home - About - Disclaimer - Privacy